Home Search

COVID-19 - search results

If you're not happy with the results, please do another search
Harness Your System, Free Decryptor, federal government, cybersecurity

3 Ways the Federal Government Is Using Technology to Advance Cybersecurity

0
When it comes to cybersecurity, the federal government is putting out fires every day — and it can be exhausting. Like most organizations, the...
Phishing, phishing attacks

The Importance of Team Diversity in Detecting Phishing Scams

0
An email subject line catches a user’s interest. The user clicks through and gets compromised. This is a classic phishing attack; it remains one...
Kaseya supply chain attacks

Discussing the Impact of the Kaseya Supply Chain Attacks

0
According to a GEP Research Report, the total cost of supply chain disruptions in 2020 was $4tn. While these disruptions were caused due to...
IoT Hacking Tools

Top 5 Internet of Things (IoT) Hacking Tools Explained

0
Internet of Things (IoT) devices raise critical security concerns for ethical hackers as these devices are easy to hack with IoT hacking tools. More than...
Microsoft Power Apps

Misconfigured Microsoft Power Apps Inadvertently Exposed 38 Mn Sensitive Records

0
A configuration issue in Microsoft Power Apps resulted in a massive data breach, exposing the sensitive information of millions of users. An analysis from...

EC-Council Launches a Specialized Web Application Hacking and Security Certification

0
Albuquerque, New Mexico, August 3, 2021: EC-Council, creators of the Certified Ethical Hacker certification, have launched their latest training and certification program specifically for...
innovation

“I am eagerly waiting for more innovation in incident response and supply chain security”

0
According to Israel National Cyber Directorate, Israeli cyber companies raised $3.36 billion in the first half of 2021, an amount that constitutes about 41%...
CEO, cybersecurity, CISO, Future of the CISO

A CEO’s Guide to Cybersecurity

0
Agile methodologies and cloud-based services and models have become popular, and in accordance with this change, the c-suite has restructured processes within their organizations....
Vulnerabilities in Zimbra

CISA Provides Details on Top Routinely Exploited Vulnerabilities in 2020 and 2021

0
Organizations can boost their overall cybersecurity posture by regularly updating their network systems and patch vulnerabilities. Understanding how attackers leverage malicious techniques and the...
BazaCall BazaLoader

Alert! Fraudulent Call Centers Tricking Users to Download BazaLoader Malware

0
Microsoft 365 Defender Threat Intelligence Team uncovered an ongoing malware campaign tricking victims into downloading malware on the targeted systems. The campaign, dubbed as...

MOST POPULAR

RECENT POSTS